Even utility tools used by database administrators can be security concerns if the tenants can use them to access, or worse yet, manipulate data that does not belong to them.
即使是数据库管理员使用的实用工具也会引起安全问题,如果租户可以使用它们访问,或者更糟,操作不属于它们的数据的话。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
Similarly, each database user is assigned a security label that determines which labeled data rows or columns he or she can access.
类似地,每个数据库用户也都被赋予一个安全标签,这个标签将决定他/她可以访问哪些贴了标签的数据行或列。
The security attributes of trusted context can be tuned to ensure air-tight access to the database servers.
可以通过调优受信任上下文的安全属性,确保对数据库服务器的无懈可击的访问。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
The database security administrator allows users access to protected data by granting them security labels.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
Security of the database access relies on a JDBC driver and a database implementation.
数据库访问安全依赖于JDBC驱动程序和数据库实现。
Similarly, each database user is assigned a security label that determines which labeled data (rows or columns) he or she can access.
类似地,每个数据库用户也被赋予一个安全标签,该标签决定他/她可以访问具有哪种标签的数据(行或列)。
Using the instance owner id "db2inst1" for database access is not recommended due to security reason.
出于安全原因,不推荐使用实例所有者id "db2inst1" 进行数据库访问。
LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.
LBAC是MandatoryAccessControl (MAC)的一个实现,它为存储在数据库中的敏感数据提供了较高级别的安全保障。
By depending on this single point of access, security can be added to RDBMS Web applications before database access.
通过依赖于这个单一访问点,在访问数据库之前,可以为rdbmsWeb应用程序添加安全性。
As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
More database security: a new security feature called Label-Based access control (LBAC) allows you to control data access at the row and column level.
增强了数据库安全性:基于标签的访问控制(Label BasedAccess Control,LBAC)是一种新的安全特性,它使您可以在行和列的级别上控制数据访问。
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
The lack of a database-level security model makes it difficult to fully leverage ZEO storage servers as clients have more or less unfettered access to the database and must therefore be trusted.
缺乏数据库级别的安全模型使得充分利用ZEO存储服务器变得非常困难,因为客户端或多或少地拥有对数据库的自由访问,因此客户端必须受信任。
DB2 gives fine-grained control over performance and security characteristics of database access-and demands correspondingly careful attention.
DB 2对数据库访问的性能和安全特性施加细粒度的控制—因此需要更细致的处理。
Security is always a concern when you enable Web services access to your database by means of Web services.
当以Web服务的方式访问数据库时,安全性总是一个值得关注的问题。
Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.
然后,就系统的三个难点问题——异常处理、安全权限控制和异构数据库访问进行了深入的研究。
The essential security technologies of the distributed database are user authentication and access control.
分布式数据库安全的核心技术是用户身份验证和访问控制。
NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.
NET构建了学校信息管理系统,本文介绍了系统的整体设计,数据库访问方法和数据安全防范措施。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
Application context can be useful for the purposes of enforcing fine-grained access control and enhances the security of database.
通过实际应用来看,应用上下文技术可以用于提高细粒度访问控制的性能,从而提高数据库的安全性。
It made information system, from access system to operate database and sign badge, all these things under security control.
使该所信息系统从用户访问系统,到操作数据库与具体实现签章等工作,都处在系统安全控制之下。
The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.
然后,论文论述了系统数据库的设计过程,其中包括安全性设计、事务管理的设计以及ADO数据访问技术的分析及运用。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
How can we access the database properly is always the key to improves efficiency of application system, enhances security of database and reduces wastage.
合理的使用访问数据库系统,对提高应用系统的效率,增强系统的安全性,减少系统损耗是非常关键的。
For security reasons, your web users should only have read access to the database.
考虑到安全因素,你的网络用户应该只允许读取数据库。
For security reasons, your web users should only have read access to the database.
考虑到安全因素,你的网络用户应该只允许读取数据库。
应用推荐